A Model for Threat Assessment
暂无分享,去创建一个
[1] Mark M. Payne. Destruction and Creation , 2010 .
[2] Erik Blasch,et al. Adaptive context assessment and context management , 2014, 17th International Conference on Information Fusion (FUSION).
[3] Brendan J. Frey,et al. Factor graphs and the sum-product algorithm , 2001, IEEE Trans. Inf. Theory.
[4] John J. Salerno. Where's level 2/3 fusion - a look back over the past 10 years , 2007, 2007 10th International Conference on Information Fusion.
[5] A. Steinberg,et al. An approach to threat assessment , 2005, 2005 7th International Conference on Information Fusion.
[6] Alan N. Steinberg,et al. Foundations of Situation and Threat Assessment , 2017 .
[7] Michael Bennett,et al. Counterdeception Principles and Applications for National Security , 2007 .
[8] Galina L. Rogova,et al. An Ontological Analysis of Threat and Vulnerability , 2006, 2006 9th International Conference on Information Fusion.
[9] Alan N. Steinberg,et al. Revisions to the JDL data fusion model , 1999, Defense, Security, and Sensing.
[10] Edward Waltz,et al. Knowledge Management in the Intelligence Enterprise , 2003 .
[11] Mark Adler,et al. Measuring the maturity of robotic planetary mission concepts , 2009 .
[12] D. McMichael,et al. Grammatical methods for situation and threat analysis , 2005, 2005 7th International Conference on Information Fusion.
[13] Jesús García,et al. Context-based Information Fusion: A survey and discussion , 2015, Inf. Fusion.
[14] Alan N. Steinberg,et al. Formalization of "Context" for Information Fusion , 2016, Context-Enhanced Information Fusion.
[15] Dale A. Lambert. A Unification of Sensor and Higher-Level Fusion , 2006, 2006 9th International Conference on Information Fusion.